Detecting and characterizing social spam campaigns | Proceedings of the 17th ACM conference on Computer and communications security (original) (raw)
Published: 04 October 2010 Publication History
Abstract
Online social networks (OSNs) are exceptionally useful collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also extremely effective tools for executing spam campaigns and spreading malware.
In this poster, we present an initial study to detect and quantitatively analyze the coordinated spam campaigns on online social networks in the wild. Our system detected about 200K malicious wall posts with embedded URLs, traced back to roughly 57K accounts. We find that more than 70% of all malicious wall posts are advertising phishing sites
References
[1]
}}Mcafee siteadvisor. http://www.siteadvisor.com/
[2]
}}Users of social networking websites face malware and phishing attacks. Symantec.com Blog
[3]
}}Zeus botnet targets facebook.http://blog.appriver.com/2009/10/zeus-botnet-targetsfacebook.html
[4]
}}KREIBICH, C., KANICH, C., LEVCHENKO, K., ENRIGHT, B., VOELKER, G., PAXSON, V., AND SAVAGE, S. Spamcraft: An inside look at spam campaign orchestration. In Proc. of LEET (2009)
[5]
}}Verisign: 1.5m facebook accounts for sale in web forum. PCMagazine, April 2010
Information & Contributors
Information
Published In
CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
October 2010
782 pages
Copyright © 2010 Copyright is held by the author/owner(s).
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 04 October 2010
Permissions
Request permissions for this article.
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
CCS '10 Paper Acceptance Rate 55 of 325 submissions, 17%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- View Citations
- Downloads (Last 12 months)9
- Downloads (Last 6 weeks)0
Reflects downloads up to 09 Feb 2025
Other Metrics
Citations
- Sharma SSingh PKumar A(2024)Fake Profile Detection on Social Networks—A SurveyProceedings of International Conference on Recent Innovations in Computing10.1007/978-981-97-3442-9_28(403-416)Online publication date: 23-Oct-2024
- Khanday ABhushan BJhaveri RKhan QRaut RRabani S(2022)NNPCov19Mobile Information Systems10.1155/2022/34129922022Online publication date: 1-Jan-2022
- Bhattacharya MRoy SChattopadhyay SDas AShetty S(2022)A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challengesSECURITY AND PRIVACY10.1002/spy2.2756:1Online publication date: 17-Oct-2022
- Wang XTang HZheng KTao Y(2020)Detection of compromised accounts for online social networks based on a supervised analytical hierarchy processIET Information Security10.1049/iet-ifs.2018.528614:4(401-409)Online publication date: Jul-2020
- Senthil Murugan NUsha Devi G(2018)Detecting Streaming of Twitter Spam Using Hybrid MethodWireless Personal Communications: An International Journal10.1007/s11277-018-5513-z103:2(1353-1374)Online publication date: 1-Nov-2018
- Ezpeleta EIturbe MGaritano Ide Mendizabal IZurutuza U(2018)A Mood Analysis on Youtube Comments and a Method for Improved Social Spam DetectionHybrid Artificial Intelligent Systems10.1007/978-3-319-92639-1_43(514-525)Online publication date: 8-Jun-2018
- Ezpeleta EGaritano IArenaza-Nuño IHidalgo JZurutuza U(2018)Novel Comment Spam Filtering Method on Youtube: Sentiment Analysis and Personality RecognitionCurrent Trends in Web Engineering10.1007/978-3-319-74433-9_21(228-240)Online publication date: 22-Feb-2018
- Vo NLee KCao CTran TChoi H(2017)Revealing and Detecting Malicious Retweeter GroupsProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201710.1145/3110025.3110068(363-368)Online publication date: 31-Jul-2017
- Cao CGe HLu HHu XCaverlee JKando NSakai TJoho HLi Hde Vries AWhite R(2017)What Are You Known For?Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3077136.3080820(743-752)Online publication date: 7-Aug-2017
- van der Tempel JNoormohamed ASchwartz RNorman CMalas MZawertailo L(2016)Vape, quit, tweet? Electronic cigarettes and smoking cessation on TwitterInternational Journal of Public Health10.1007/s00038-016-0791-261:2(249-256)Online publication date: 3-Feb-2016
- Show More Cited By
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Full Access
View options
View or Download as a PDF file.
eReader
View online with eReader.
Figures
Tables
Media
Affiliations
Hongyu Gao
Northwestern University, Evanston, IL, USA
Jun Hu
Christo Wilson
U. C. Santa Barbara, Santa Barbara, CA, USA
Zhichun Li
Northwestern University, Evanston, IL, USA
Yan Chen
Northwestern University, Evanston, IL, USA
Ben Y. Zhao
U. C. Santa Barbara, Santa Barbara, CA, USA